Skip to main content
Top
Published in: AI & SOCIETY 2/2018

09-02-2018 | Original Article

Mitigating risks of digitalization through managed industrial security services

Authors: Christoph Jansen, Sabina Jeschke

Published in: AI & SOCIETY | Issue 2/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Digitalization has become a cornerstone of competitiveness in the industrial arena, especially in the cases of small lot sizes with many variants in the goods produced. Managers of industrial facilities have to handle the complexity that comes along with Industry 4.0 in diverse dimensions to leverage the potentials of digitalization for their sites. This article describes major drivers of this complexity in current industrial automation to outline the environment of today’s challenges for managers of this technical transition—and shows how managed industrial security services can contribute to stabilize the industrial system. An outlook is given to future automation scenarios as well as the major concepts involved in their protection.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
go back to reference Berners-Lee T et al (2001) The Semantic Web. Scientific American, May 2001 Berners-Lee T et al (2001) The Semantic Web. Scientific American, May 2001
go back to reference BSI (2014) UP KRITIS Öffentlich-Private Partnerschaft zum Schutz Kritischer Infrastrukturen. Bundesamt für Sicherheit in der Informationstechnik, Bonn BSI (2014) UP KRITIS Öffentlich-Private Partnerschaft zum Schutz Kritischer Infrastrukturen. Bundesamt für Sicherheit in der Informationstechnik, Bonn
go back to reference Colombo AW et al (2014) Industrial cloud-based cyber-physical systems: the IMC-AESOP approach. Springer, HeidelbergCrossRef Colombo AW et al (2014) Industrial cloud-based cyber-physical systems: the IMC-AESOP approach. Springer, HeidelbergCrossRef
go back to reference COM (2006) Communication from the commission on a European programme for critical infrastructure protection. COM(2006) 786 final. Commission of the European Communities, Brussels COM (2006) Communication from the commission on a European programme for critical infrastructure protection. COM(2006) 786 final. Commission of the European Communities, Brussels
go back to reference Fuhrmans V (2010) Virus attacks siemens plant-control systems. The Wall Street Journal, July 22 Fuhrmans V (2010) Virus attacks siemens plant-control systems. The Wall Street Journal, July 22
go back to reference Geisberger E, Broy M (2012) agendaCPS—Integrierte Forschungsagenda Cyber-Physical Systems. acatech—Deutsche Akademie der Technikwissenschaften e.V., München/Garching Geisberger E, Broy M (2012) agendaCPS—Integrierte Forschungsagenda Cyber-Physical Systems. acatech—Deutsche Akademie der Technikwissenschaften e.V., München/Garching
go back to reference Goltz U et al (2015) Design for future: managed software evolution. In: Glesner S (ed) Computer science—research and development. Springer, Heidelberg and Berlin Goltz U et al (2015) Design for future: managed software evolution. In: Glesner S (ed) Computer science—research and development. Springer, Heidelberg and Berlin
go back to reference Hu F et al (2016) Robust cyber-physical systems: concept, models and implementation. In: Future generation computer systems, vol 56, Elsevier, Amsterdam pp 449–475 Hu F et al (2016) Robust cyber-physical systems: concept, models and implementation. In: Future generation computer systems, vol 56, Elsevier, Amsterdam pp 449–475
go back to reference Huber A (2013) Das Ziel Digital Enterprise: die professionelle digitale Abbildung von Produktentwicklung und Produktion. In: Industry 4.0. Springer, Berlin, pp 111–124 Huber A (2013) Das Ziel Digital Enterprise: die professionelle digitale Abbildung von Produktentwicklung und Produktion. In: Industry 4.0. Springer, Berlin, pp 111–124
go back to reference Karnouskos S (2011). Stuxnet worm impact on industrial cyber-physical system security. In: 37th Annual Conference of the IEEE Industrial Electronics Society (IECON 2011), 7–10 Nov 2011, Melbourne, Australia Karnouskos S (2011). Stuxnet worm impact on industrial cyber-physical system security. In: 37th Annual Conference of the IEEE Industrial Electronics Society (IECON 2011), 7–10 Nov 2011, Melbourne, Australia
go back to reference Koscher K et al (2010) Experimental security analysis of a modern automobile. In: Proceedings of the 31st IEEE symposium on security and privacy Koscher K et al (2010) Experimental security analysis of a modern automobile. In: Proceedings of the 31st IEEE symposium on security and privacy
go back to reference Leavitt N (2010) Researchers fight to keep implanted medical devices save from hackers. Computer 34(8):11–14CrossRef Leavitt N (2010) Researchers fight to keep implanted medical devices save from hackers. Computer 34(8):11–14CrossRef
go back to reference Mills E (2009) Hackers broke into FAA air traffic control systems. The Wall Street Journal, p A6 Mills E (2009) Hackers broke into FAA air traffic control systems. The Wall Street Journal, p A6
go back to reference Müller-Schloer et al (2004) Organic computing. Informatik-Spektrum, vol 27, 4, 332–336 Müller-Schloer et al (2004) Organic computing. Informatik-Spektrum, vol 27, 4, 332–336
go back to reference O’Connell K (2008). CIA Report: cyber extortionists attacked foreign power grid, disrupting delivery. Internet Business Law Services O’Connell K (2008). CIA Report: cyber extortionists attacked foreign power grid, disrupting delivery. Internet Business Law Services
go back to reference Wan K et al (2010) Specification, analyzing challenges and approaches for cyber-physical systems (CPS). Eng Lett 18(3):308–315 Wan K et al (2010) Specification, analyzing challenges and approaches for cyber-physical systems (CPS). Eng Lett 18(3):308–315
go back to reference Zimmerman C (2014) Ten strategies of a world-class cybersecurity operations center. The MITRE Corporation, Bedford Zimmerman C (2014) Ten strategies of a world-class cybersecurity operations center. The MITRE Corporation, Bedford
Metadata
Title
Mitigating risks of digitalization through managed industrial security services
Authors
Christoph Jansen
Sabina Jeschke
Publication date
09-02-2018
Publisher
Springer London
Published in
AI & SOCIETY / Issue 2/2018
Print ISSN: 0951-5666
Electronic ISSN: 1435-5655
DOI
https://doi.org/10.1007/s00146-018-0812-1

Other articles of this Issue 2/2018

AI & SOCIETY 2/2018 Go to the issue

Premium Partner